Formal Methods in Information Security

Authors

  • AJAYI ADEBOWALE
  • NICULAE GOGA
  • OTUSILE OLUWABUKOLA
  • ABEL SAMUEL

DOI:

https://doi.org/10.24297/ijct.v14i4.1963

Keywords:

Formal Methods, Information Security, protocol engineering

Abstract

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.

Downloads

Download data is not yet available.

Downloads

Published

2015-02-09

How to Cite

ADEBOWALE, A., GOGA, N., OLUWABUKOLA, O., & SAMUEL, A. (2015). Formal Methods in Information Security. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 14(4), 5621–5631. https://doi.org/10.24297/ijct.v14i4.1963

Issue

Section

Research Articles